SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2021:14724-1
Rating:             important
References:         #1056134 #1180963 #1182715 #1182716 #1182717 
                    #1183400 #1183696 #1184120 #1184194 #1184198 
                    #1184208 #1184211 #1184393 
Cross-References:   CVE-2020-35519 CVE-2020-36322 CVE-2021-20261
                    CVE-2021-27363 CVE-2021-27364 CVE-2021-27365
                    CVE-2021-28950 CVE-2021-28972 CVE-2021-29650
                    CVE-2021-30002 CVE-2021-3483
CVSS scores:
                    CVE-2020-35519 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2020-36322 (SUSE): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
                    CVE-2021-20261 (NVD) : 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-20261 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-27363 (NVD) : 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
                    CVE-2021-27363 (SUSE): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
                    CVE-2021-27364 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
                    CVE-2021-27364 (SUSE): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
                    CVE-2021-27365 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-27365 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-28950 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-28972 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-28972 (SUSE): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-29650 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-29650 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-30002 (NVD) : 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-30002 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:
                    SUSE Linux Enterprise Server 11-SP4-LTSS
                    SUSE Linux Enterprise Server 11-EXTRA
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that solves 11 vulnerabilities and has two fixes
   is now available.

Description:

   The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various
   security and bugfixes.

   The following security bugs were fixed:

   - CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
   - CVE-2021-30002: Fixed a memory leak for large arguments in
     video_usercopy (bsc#1184120).
   - CVE-2021-29650: Fixed an issue where the netfilter subsystem allowed
     attackers to cause a denial of service (bsc#1184208).
   - CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a
     new device name to the driver from userspace, allowing userspace to
     write data to the kernel stack frame directly (bsc#1184198).
   - CVE-2021-28950: Fixed an infinite loop because a retry loop continually
     finds the same bad inode (bsc#1184194).
   - CVE-2021-27365: Fixed an issue where an unprivileged user can send a
     Netlink message that is associated with iSCSI, and has a length up to
     the maximum length of a Netlink message (bsc#1182715).
   - CVE-2021-27364: Fixed an issue where an attacker could craft Netlink
     messages (bsc#1182717).
   - CVE-2021-27363: Fixed a kernel pointer leak which could have been used
     to determine the address of the iscsi_transport structure (bsc#1182716).
   - CVE-2021-20261: Fixed a race condition in the implementation of the
     floppy disk drive controller driver software (bsc#1183400).
   - CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation
     which could have caused a system crash (bsc#1184211).
   - CVE-2020-35519: Fixed an out-of-bounds memory access  was found in
     x25_bind (bsc#1183696).

   The following non-security bugs were fixed:

   - md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show
     (bsc#1056134, bsc#1180963).


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP4-LTSS:

      zypper in -t patch slessp4-kernel-source-14724=1

   - SUSE Linux Enterprise Server 11-EXTRA:

      zypper in -t patch slexsp3-kernel-source-14724=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-kernel-source-14724=1



Package List:

   - SUSE Linux Enterprise Server 11-SP4-LTSS (i586 ppc64 s390x x86_64):

      kernel-default-3.0.101-108.126.1
      kernel-default-base-3.0.101-108.126.1
      kernel-default-devel-3.0.101-108.126.1
      kernel-source-3.0.101-108.126.1
      kernel-syms-3.0.101-108.126.1
      kernel-trace-3.0.101-108.126.1
      kernel-trace-base-3.0.101-108.126.1
      kernel-trace-devel-3.0.101-108.126.1

   - SUSE Linux Enterprise Server 11-SP4-LTSS (i586 x86_64):

      kernel-ec2-3.0.101-108.126.1
      kernel-ec2-base-3.0.101-108.126.1
      kernel-ec2-devel-3.0.101-108.126.1
      kernel-xen-3.0.101-108.126.1
      kernel-xen-base-3.0.101-108.126.1
      kernel-xen-devel-3.0.101-108.126.1

   - SUSE Linux Enterprise Server 11-SP4-LTSS (s390x):

      kernel-default-man-3.0.101-108.126.1

   - SUSE Linux Enterprise Server 11-SP4-LTSS (ppc64):

      kernel-bigmem-3.0.101-108.126.1
      kernel-bigmem-base-3.0.101-108.126.1
      kernel-bigmem-devel-3.0.101-108.126.1
      kernel-ppc64-3.0.101-108.126.1
      kernel-ppc64-base-3.0.101-108.126.1
      kernel-ppc64-devel-3.0.101-108.126.1

   - SUSE Linux Enterprise Server 11-SP4-LTSS (i586):

      kernel-pae-3.0.101-108.126.1
      kernel-pae-base-3.0.101-108.126.1
      kernel-pae-devel-3.0.101-108.126.1

   - SUSE Linux Enterprise Server 11-EXTRA (i586 ia64 ppc64 s390x x86_64):

      kernel-default-extra-3.0.101-108.126.1

   - SUSE Linux Enterprise Server 11-EXTRA (i586 x86_64):

      kernel-xen-extra-3.0.101-108.126.1

   - SUSE Linux Enterprise Server 11-EXTRA (x86_64):

      kernel-trace-extra-3.0.101-108.126.1

   - SUSE Linux Enterprise Server 11-EXTRA (ppc64):

      kernel-ppc64-extra-3.0.101-108.126.1

   - SUSE Linux Enterprise Server 11-EXTRA (i586):

      kernel-pae-extra-3.0.101-108.126.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ppc64 s390x x86_64):

      kernel-default-debuginfo-3.0.101-108.126.1
      kernel-default-debugsource-3.0.101-108.126.1
      kernel-trace-debuginfo-3.0.101-108.126.1
      kernel-trace-debugsource-3.0.101-108.126.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 s390x x86_64):

      kernel-default-devel-debuginfo-3.0.101-108.126.1
      kernel-trace-devel-debuginfo-3.0.101-108.126.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64):

      kernel-ec2-debuginfo-3.0.101-108.126.1
      kernel-ec2-debugsource-3.0.101-108.126.1
      kernel-xen-debuginfo-3.0.101-108.126.1
      kernel-xen-debugsource-3.0.101-108.126.1
      kernel-xen-devel-debuginfo-3.0.101-108.126.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64):

      kernel-bigmem-debuginfo-3.0.101-108.126.1
      kernel-bigmem-debugsource-3.0.101-108.126.1
      kernel-ppc64-debuginfo-3.0.101-108.126.1
      kernel-ppc64-debugsource-3.0.101-108.126.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586):

      kernel-pae-debuginfo-3.0.101-108.126.1
      kernel-pae-debugsource-3.0.101-108.126.1
      kernel-pae-devel-debuginfo-3.0.101-108.126.1


References:

   https://www.suse.com/security/cve/CVE-2020-35519.html
   https://www.suse.com/security/cve/CVE-2020-36322.html
   https://www.suse.com/security/cve/CVE-2021-20261.html
   https://www.suse.com/security/cve/CVE-2021-27363.html
   https://www.suse.com/security/cve/CVE-2021-27364.html
   https://www.suse.com/security/cve/CVE-2021-27365.html
   https://www.suse.com/security/cve/CVE-2021-28950.html
   https://www.suse.com/security/cve/CVE-2021-28972.html
   https://www.suse.com/security/cve/CVE-2021-29650.html
   https://www.suse.com/security/cve/CVE-2021-30002.html
   https://www.suse.com/security/cve/CVE-2021-3483.html
   https://bugzilla.suse.com/1056134
   https://bugzilla.suse.com/1180963
   https://bugzilla.suse.com/1182715
   https://bugzilla.suse.com/1182716
   https://bugzilla.suse.com/1182717
   https://bugzilla.suse.com/1183400
   https://bugzilla.suse.com/1183696
   https://bugzilla.suse.com/1184120
   https://bugzilla.suse.com/1184194
   https://bugzilla.suse.com/1184198
   https://bugzilla.suse.com/1184208
   https://bugzilla.suse.com/1184211
   https://bugzilla.suse.com/1184393

SUSE: 2021:14724-1 important: the Linux Kernel

May 12, 2021
An update that solves 11 vulnerabilities and has two fixes is now available

Summary

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393). - CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120). - CVE-2021-29650: Fixed an issue where the netfilter subsystem allowed attackers to cause a denial of service (bsc#1184208). - CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198). - CVE-2021-28950: Fixed an infinite loop because a retry loop continually finds the same bad inode (bsc#1184194). - CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715). - CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717). - CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716). - CVE-2021-20261: Fixed a race condition in the implementation of the floppy disk drive controller driver software (bsc#1183400). - CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation which could have caused a system crash (bsc#1184211). - CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696). The following non-security bugs were fixed: - md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1056134, bsc#1180963).

References

#1056134 #1180963 #1182715 #1182716 #1182717

#1183400 #1183696 #1184120 #1184194 #1184198

#1184208 #1184211 #1184393

Cross- CVE-2020-35519 CVE-2020-36322 CVE-2021-20261

CVE-2021-27363 CVE-2021-27364 CVE-2021-27365

CVE-2021-28950 CVE-2021-28972 CVE-2021-29650

CVE-2021-30002 CVE-2021-3483

CVSS scores:

CVE-2020-35519 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2020-36322 (SUSE): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

CVE-2021-20261 (NVD) : 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-20261 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-27363 (NVD) : 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

CVE-2021-27363 (SUSE): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

CVE-2021-27364 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

CVE-2021-27364 (SUSE): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

CVE-2021-27365 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-27365 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-28950 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-28972 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-28972 (SUSE): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-29650 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-29650 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-30002 (NVD) : 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-30002 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

SUSE Linux Enterprise Server 11-SP4-LTSS

SUSE Linux Enterprise Server 11-EXTRA

SUSE Linux Enterprise Debuginfo 11-SP4

https://www.suse.com/security/cve/CVE-2020-35519.html

https://www.suse.com/security/cve/CVE-2020-36322.html

https://www.suse.com/security/cve/CVE-2021-20261.html

https://www.suse.com/security/cve/CVE-2021-27363.html

https://www.suse.com/security/cve/CVE-2021-27364.html

https://www.suse.com/security/cve/CVE-2021-27365.html

https://www.suse.com/security/cve/CVE-2021-28950.html

https://www.suse.com/security/cve/CVE-2021-28972.html

https://www.suse.com/security/cve/CVE-2021-29650.html

https://www.suse.com/security/cve/CVE-2021-30002.html

https://www.suse.com/security/cve/CVE-2021-3483.html

https://bugzilla.suse.com/1056134

https://bugzilla.suse.com/1180963

https://bugzilla.suse.com/1182715

https://bugzilla.suse.com/1182716

https://bugzilla.suse.com/1182717

https://bugzilla.suse.com/1183400

https://bugzilla.suse.com/1183696

https://bugzilla.suse.com/1184120

https://bugzilla.suse.com/1184194

https://bugzilla.suse.com/1184198

https://bugzilla.suse.com/1184208

https://bugzilla.suse.com/1184211

https://bugzilla.suse.com/1184393

Severity
Announcement ID: SUSE-SU-2021:14724-1
Rating: important

Related News